Prioritising security vulnerabilities in ports
暂无分享,去创建一个
Jin Wang | Zaili Yang | Adolf K.Y. Ng | Jin Wang | Zaili Yang | A. Ng
[1] Todd Masse,et al. The Department of Homeland Security's Risk Assessment Methodology: Evolution, Issues, and Options for Congress , 2007 .
[2] Robin L Dillon,et al. Risk‐Based Decision Making for Terrorism Applications , 2009, Risk analysis : an official publication of the Society for Risk Analysis.
[3] Luis Martínez-López,et al. Self-tuning of fuzzy belief rule bases for engineering system safety analysis , 2008, Ann. Oper. Res..
[4] Jin Wang,et al. Fuzzy Rule-Based Bayesian Reasoning Approach for Prioritization of Failures in FMEA , 2008, IEEE Transactions on Reliability.
[5] Sandro Bologna,et al. Safeguarding information intensive critical infrastructures against novel types of emerging failures , 2007, Reliab. Eng. Syst. Saf..
[6] Tom Petersen,et al. Importance and Exposure in Road Network Vulnerability Analysis , 2006 .
[7] Kristian G. Olesen,et al. HUGIN - a Shell for Building Belief Universes for Expert Systems , 1989, IJCAI 1989.
[8] Seth D. Guikema,et al. Probabilistic Modeling of Terrorist Threats: A Systems Analysis Approach to Setting Priorities Among Countermeasures , 2002 .
[9] S Bonsall,et al. Use of Fuzzy Evidential Reasoning in Maritime Security Assessment , 2009, Risk analysis : an official publication of the Society for Risk Analysis.
[10] Jin Wang,et al. The application of the Six Sigma concept to port security process quality control , 2007, Qual. Reliab. Eng. Int..
[11] Hong-Zhong Huang,et al. Bayesian reliability analysis for fuzzy lifetime data , 2006, Fuzzy Sets Syst..
[12] A. G. Eleye-Datubo,et al. Marine and Offshore Safety Assessment by Incorporative Risk Modeling in a Fuzzy‐Bayesian Network of an Induced Mass Assignment Paradigm , 2008, Risk analysis : an official publication of the Society for Risk Analysis.
[13] Terje Aven,et al. Identification of safety and security critical systems and activities , 2009, Reliab. Eng. Syst. Saf..
[14] Jukka Hallikas,et al. Origin and Impact of Supply Chain Risks Affecting Supply Security , 2012 .
[15] Detlof von Winterfeldt,et al. Meeting the Challenges of Terrorism Risk Analysis , 2007 .
[16] Massimo Marchiori,et al. Vulnerability and protection of infrastructure networks. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.
[17] Vicki M. Bier,et al. Game-Theoretic and Reliability Methods in Counterterrorism and Security , 2006 .
[18] George E. Apostolakis,et al. Identification of critical locations across multiple infrastructures for terrorist actions , 2007, Reliab. Eng. Syst. Saf..
[19] Adrian V. Gheorghe,et al. Critical Infrastructures at Risk , 2006 .
[20] Henry H. Willis. Guiding Resource Allocations Based on Terrorism Risk , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[21] Chris W. Johnson. Understanding the interaction between public policy, managerial decision-making and the engineering of critical infrastructures , 2007, Reliab. Eng. Syst. Saf..
[22] Martin J. Alperen. The Department of Homeland Security , 2011 .
[23] Adolf K.Y. Ng,et al. The Evolution and Research Trends of Port Geography , 2013 .
[24] Girish Gujar,et al. Port security in asia , 2013 .
[25] Henrik Jönsson,et al. Identifying Critical Components in Electric Power Systems: A Network Analytic Approach , 2007 .
[26] B John Garrick. Perspectives on the use of risk assessment to address terrorism. , 2002, Risk analysis : an official publication of the Society for Risk Analysis.
[27] Adolf K.Y. Ng,et al. Port Security: The ISPS Code , 2012 .
[28] Roger Stough,et al. The Revenge of Distance: Vulnerability Analysis of Critical Information Infrastructure , 2003, cond-mat/0310427.
[29] Kai-Chieh Hu,et al. Evaluation of the service quality of container ports by importance-performance analysis , 2012 .
[30] Terje Aven,et al. A unified framework for risk and vulnerability analysis covering both safety and security , 2007, IEEE Engineering Management Review.
[31] Jin Wang,et al. Technology and Safety of Marine Systems , 2003 .
[32] M. van der Borst,et al. An overview of PSA importance measures , 2001, Reliab. Eng. Syst. Saf..
[33] Bilal M Ayyub,et al. Critical Asset and Portfolio Risk Analysis: An All‐Hazards Framework , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[34] Chin-Shan Lu,et al. The effect of safety management on perceived safety performance in container stevedoring operations , 2011 .